Listing Thumbnail

    Trellix Helix with GenAI

     Info
    Sold by: Trellix 
    Deployed on AWS
    Trellix Helix unifies threat events across the security stack and applies AI-driven analytics, alert triage, and automation to accelerate detection, investigation, and response. By correlating data from Trellix and 500+ third-party tools, Helix reveals the full attack story while reducing manual pivots and analyst workload. Key capabilities include AI-driven detection and triage, no-code hyperautomation for investigation and response, and an open integration ecosystem that supports cloud, hybrid, and air-gapped deployments.
    3.8

    Overview

    Trellix Helix helps accelerate your SOC maturity with 100% alert triage, prioritization of threats and GenAI powered insights. Analysts of any level are empowered to prioritize investigations, get straight forward summaries and guidance to remediate or hunt for threats. Helix Connect integrates security controls from the Trellix Security Platform and over 500 third-parties (including 13 AWS integrations) to create deep multi-vector threat detections. Data is ingested from multiple sources, then correlated by pre-built analytics and rules so that you can rapidly see the complete story of an attack. UI-driven, point and click automation helps you to offload repetitive tasks and boost your SecOps team efficiency. Most customers will prefer an AWS Private Offer be extended, which may include customizations to the offering or additional pricing considerations. Not all purchasing options are shown due to the common requirement to customize each deployment of Trellix Helix Connect.

    Highlights

    • Improve SOC efficiency - Adding AI can do the work of several SOC analysts who are overwhelmed with logs and alerts.
    • Reduce Risk - AI can help organizations focus on the most important threats.
    • Revolutionize your SOC with AI-powered speed, adaptive threat insights, and AI-guided investigations.

    Details

    Sold by

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Trellix Helix with GenAI

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (6)

     Info
    Dimension
    Description
    Cost/12 months
    Helix-Connect-100
    Trellix Helix Connect - 100 users - Annual
    $6,300.00
    Helix-Connect-1000
    Trellix Helix Connect - 1000 users - Annual
    $56,700.00
    Trellix-OpenXDR-50GB
    Trellix Open XDR for External Data add-on - 50GB addon
    $21,971.25
    EDR Wise Add-on 1:1TE
    QTY Range 5-250 per user/annual
    $24.15
    EDR Wise Add-on 1:1TE
    QTY Range 251-1000 per user/annual
    $21.60
    EDR Wise Add-on 1:1TE
    QTY Range 1001-2000 per user/annual
    $19.20

    Vendor refund policy

    Refunds are handled on a per case basis.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Please reach out to us at support@trellix.com  with any questions or concerns, and our support team will be more than happy to help.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Education & Research
    Top
    10
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Correlation
    Advanced multi-vector threat detection by correlating data from multiple security tools and sources
    AI-Driven Analytics
    Machine learning and generative AI capabilities for automated alert triage, threat prioritization, and investigation insights
    Security Integration Framework
    Open integration ecosystem supporting cloud, hybrid, and air-gapped environments with compatibility across 500+ third-party security tools
    Automated Investigation
    No-code hyperautomation capabilities for streamlining security investigation and response workflows
    Threat Detection Engine
    Pre-built analytics and correlation rules for comprehensive attack story reconstruction and rapid threat identification
    Threat Detection
    Advanced endpoint detection and response (EDR) capabilities with multi-stage threat identification across attack vectors
    Cross-Source Security Monitoring
    Unified XDR platform enabling threat detection and investigation across network, cloud, endpoint, identity, and email data sources
    Prevention Technology
    Sophisticated prevention-first approach using advanced blocking technologies against broad range of cyber attacks
    Incident Response
    Comprehensive tools for investigating, hunting, and responding to suspicious activities and indicators of attack
    Security Integration
    Flexible cybersecurity platform with integration capabilities across multiple security tools and technology ecosystems
    Threat Detection and Response
    Advanced extended detection and response (XDR) platform with deep and broad threat visibility across multiple digital environments
    Cloud Security Coverage
    Comprehensive security protection for cloud workloads, containers, networks, serverless functions, storage, and open source vulnerabilities
    Global Threat Intelligence
    Cybersecurity platform leveraging decades of security expertise and continuous global threat research
    Multi-Environment Protection
    Security solution spanning cloud, networks, devices, and endpoint protection with integrated monitoring capabilities
    Enterprise Security Platform
    Purpose-built threat defense platform providing unified security management across digital infrastructure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    3.8
    17 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    71%
    24%
    6%
    0%
    2 AWS reviews
    |
    15 external reviews
    External reviews are from PeerSpot .
    CESARCASTRO

    Cross-site threat hunting has improved visibility and supports proactive incident response

    Reviewed on Jan 07, 2026
    Review from a verified AWS customer

    What is our primary use case?

    We are in the energy market, specifically in energy generation. We got the Trellix EDR installed in most endpoints.

    How has it helped my organization?

    The tool helps us to traverse possible thread incidents thru our mult site network infrastructure. In case of any forensic case it will be helpful to hunt thru the history or evidence information the EDR collects.

    What is most valuable?

    Trellix Endpoint Detection and Response (EDR)  is valuable because we have a Wide Area Network with many sites, and the EDR is cross-site since it is configured and managed from the cloud. This is very useful because it does not matter what is happening at one endpoint of the company in one site and the relation of an incident with another computer or endpoint at another site. All the tree of data that we have, which may be a lot of information help us to argue whether it is going to be a threat or not, can be analyzed. Most of the threats are not really threats, but we can see what is happening in the relations, in the networking, and the data that comes back and forth through our company's network infrastructure.

    Threat hunting is valuable because it pinpoints what is happening everywhere in our networking infrastructure. We have a company contract working through a NOC- network operating center 24 hours a day. They are sending us reports many times a day if any threat is arising or asking why this operation has come through or if it is valid or not, or whether we have approved it. We have a lot of that type of information, but we need to manage the contract in a much more efficient way because I do not have the time to read the many information that comes through the network operating center, the security operating center, or the tools itself and the notification reports that I have. While I am managing the policies and the standards, I need a lot of people to monitor, detect, and recover if something happens. The tools are not useful for that. We need to have people with enough expertise to manage all of this.

    What needs improvement?

    I believe this is a product in evolution. I do not think it is a final tool to conduct forensics or information forensics of the incidents or information incidents that could arise in our network infrastructure. Trellix Endpoint Detection and Response (EDR)  is interesting and is a very good entry point that has been evolving through the last years. In the next two months, I have a new contract, and we are pointing out to have an XDR  solution with NDR and EDR together.

    I do not have enough time to do it because I am the manager. However, my coworkers do not understand it yet. I have a contract with a third-party company that is making reports around that, but also they do not have enough experience or enough utility of this.

    It would be interesting if I have a notification system from EDR. For example, if I am the manager, it would be interesting to have a warning, alarm, or something around that which could call me to get into the system and the dashboard to see what is happening. For example, if it is a high-level threat. However, most of them are just advisory or warnings. I do not enter the tool frequently. I guess I access it once every three months.

    For how long have I used the solution?

    I have been using Trellix Endpoint Detection and Response (EDR) for about six years.

    What do I think about the stability of the solution?

    As mentioned, this is an evolutionable tool. In the past there has been many times when the tool clogged the endpoints and we had to uninstall it. Windows (c) 10 enterprise edition, for instance, has some problems.

    What do I think about the scalability of the solution?

    I have not scalate the EDR solution yet. We have not had a critical alert to do it. It's supossed that the SOC company should do it just in the case.

    How are customer service and support?

    Tech support may be tricky if the support comes from Asia experts. Eeryone here speaks spanish and I are not affordable most of time. The tech is interesting when a high support level is called. Once someone from Argentina helped me that has excellent skills. We need more like her.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    No other EDR solutions.

    How was the initial setup?

    I guess it was complex. To get the EDR operating useful I had to wait around 2 years.

    What about the implementation team?

    Bafing from Peru is an integrator and consultant. They had done all of the work, and accompanied us many years.

    What was our ROI?

    Of course this is a yes. I had called the US partner during the past years when I need the support directly from the manufacturer and I got all the help to workaround or overcame issues. That had happended when my local partner company was not enough.

    What's my experience with pricing, setup cost, and licensing?

    I pay for what we get. But the service level from my partner company is not enough to overcome a complex case.

    Which other solutions did I evaluate?

    We are a gobernment company, so we ask the system to contract a company that is resourceful with cybersecurity withount mentioning the name or mark. We had been using Trellix since it was Mc Afee. But I had evaluated solutions from Microsoft, Panda, ESNET, as general malware tools.

    What other advice do I have?

    This year, I am planning to have a training for all the personnel of the company in every department so they can learn the basics of the endpoint tool. They can have more actions for possible threats or everything so they can help my department to make a better and faster action if something real is happening. Something like ethical hacking or a service, but using my own personnel in the company. I know that it is difficult, but I want to try to make that this year.

    I have evaluated many products including Fortinet environment and a lot of appliances, and also many other products that we have now. I have evaluated around six or seven other brands or other products. However, I have learned Trellix Endpoint Detection and Response (EDR) tools and before that McAfee, around two decades. It is enough expertise that we have made. I do not want to lose that with maybe another interesting tool. For example, what would be interesting is if an XDR  tool that can help us in managing the threats of the cybersecurity environment uses AI as an agent, a trained agent that helps our department, so it has to be trained first by a company like Trellix or another with the expertise or the capacity to help us actually. That is one thing I can recommend.

    In February or March, I am signing a new contract with five levels, three more levels of security that we have now. We will have the tool, the SOC, the operating center service, and we need to manage applications firewall, web filtering, and XDR, and maybe next year also PAM and so on. I rated this solution an 8 out of 10.

    CESARCASTRO

    Enhancements needed for security alerts while ongoing training strengthens defenses

    Reviewed on Jan 03, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I use César for our endpoints, our users, and the services from email and web services, back and forth, and also at the edge of our network. We have contracted firewalls and everything else for networking.

    What is most valuable?

    The product and the services we have are quite good. However, I cannot stay at this level forever. I have to improve continuously and dynamically.

    Everything is working, and the company is training its personnel. I have had in a few months in the past some attacks on personnel—so phishing, for example. I have spent efforts on training our managers and others - what can software do if the knowledge base is low?

    What needs improvement?

    This year, I am going to improve some tools to be installed or maybe acquire some services to better manage our web services and work with my coworkers.

    Application fiber also needs attention. Nowadays I am making applications that are publicly seen on the Internet. I need some protection, possibly multi-factor authentication improvements. I am seeing, for workflows, some sort of ethical hacking to test our environment.

    Knowledge of everything, not only the product - maybe some kind of alerts - needs to emerge. I see the current ones as very low-tier, and they must improve.

    For how long have I used the solution?

    I have used Trellix for some years.

    What do I think about the stability of the solution?

    I haven't had any issues. The pricing is very fine and according to the service. Trellix has done a good job reducing threats.

    How are customer service and support?

    I have spent a lot of time with this product. I have contracted support and also have an operating control so I can get various types of support.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have used Trellix for some years. In the past, the EDR was McAfee. I have worked with it for around 20 years.

    How was the initial setup?

    The initial setup is a hard issue.

    What about the implementation team?

    I have two contractors that help me support the infrastructure here. One is at the edge of networking, and the other is in the endpoints of our company.

    What was our ROI?

    I don't have any return on this investment. This is just a security policy for everything.

    What's my experience with pricing, setup cost, and licensing?

    I haven't had any really great problems with pricing in the past two or three years.

    Which other solutions did I evaluate?

    Maybe another level of product and support from manufacturers would be better.

    What other advice do I have?

    I have seen companies without any EDR services, and we were lacking information. I started with IDR around four years ago, and the support services were very light. I remember doing many tickets for Trellix support, and my EDR was not properly functioning. I didn't feel the detection or the real protection. My company is one among 17 others that are part of a corporation. I am a member of the IT Security Council.

    Overall product rating is five out of ten.

    Sampath Acharya

    Helpful to detect malware and threats

    Reviewed on Sep 06, 2024
    Review from a verified AWS customer

    What is our primary use case?

    I use the solution in my company for malware detection. My customers are mostly banking and government organizations.

    What is most valuable?

    The most valuable feature of the solution is its area for threat detection.

    What needs improvement?

    When it comes to some unknown fileless attacks, the tool is not able to detect them properly, making it an area where improvements are required.

    The tool's support needs to improve in the areas of response it provides to users.

    For how long have I used the solution?

    I have been using Trellix Endpoint Detection and Response (EDR) for two and a half years.

    What do I think about the stability of the solution?

    Stability-wise, I rate the solution an eight out of ten.

    What do I think about the scalability of the solution?

    Scalability-wise, I rate the solution an eight out of ten.

    How are customer service and support?

    I rate the technical support a seven and a half out of ten.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    The solution is SaaS-based, and we have deployed it using the hybrid cloud model.

    The tool's deployment phase is a lengthy process. For one endpoint, it takes 15 to 20 minutes.

    What was our ROI?

    The tool is cost-effective. Many agents need to be installed, and on-premises integration is required.

    What other advice do I have?

    I haven't worked on the tool to see how it works for security workflow.

    My customers have not seen any challenges while working with Trellix Endpoint Detection and Response (EDR) in terms of integrations.

    The tool does not support any AI and security initiatives.

    The tool is suitable for enterprise companies.

    If businesses are completely on the cloud, then the tool is not required. If a company has a hybrid cloud model with an on-premises model, then it will be a good tool to use.

    I rate the tool an eight out of ten.

    RiaanDu Preez

    Has behavior monitoring, DLP, and access control

    Reviewed on Aug 15, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I've used Trellix EDR to improve endpoints and servers' security and feed into MDR solutions.

    What is most valuable?

    The most useful features are behavior monitoring, DLP, and access control. The automation has gotten much better in the last two years than when it was McAfee. It works better now and integrates more smoothly.

    What needs improvement?

    I'd like the tool to become more like an XDR, with one management system and endpoint activation.

    For how long have I used the solution?

    I have been using the solution for seven years.

    What do I think about the stability of the solution?

    Sometimes, stability issues come from incorrect partner deployments, not Trellix EDR itself.

    What do I think about the scalability of the solution?

    I rate the tool a seven out of ten. To improve it, I'd like a cloud-based management system where I only need to put a correlator at the client's site, as CyberArk does. The best setup would be cloud management, a manager in a VM, and super agents on endpoints.

    How are customer service and support?

    My opinion about technical support might be biased because I have direct access to top-level senior staff. I know some people struggle with support if they go through normal channels.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Setting up the solution is easy for me because I've been in cybersecurity for almost 30 years, but new users might find it hard. Depending on the client's needs, it can be set up on-premises, in a private or hybrid cloud, or fully in the cloud. Setting it up can take a few days for small environments or months for big companies with thousands of endpoints.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is a problem in South Africa. It could be cheaper here. The rand-to-dollar exchange rate makes it expensive for us. A 25 dollar endpoint cost becomes quite significant when converted to rand.

    What other advice do I have?

    Our clients are usually medium-sized and enterprise businesses. Overall, I would recommend Trellix EDR to others. I'd rate it eight and a half out of ten. No EDR or XDR solution gets a nine from me right now because they all have room for improvement.

    Abdullah Al Hadi

    Helps to detect and identify critical management activities with dashboard to analyze data

    Reviewed on Aug 12, 2024
    Review provided by PeerSpot

    What is our primary use case?

    We use the solution to detect and identify critical management activities. Within the network level, you can understand what is happening in the environment. Organizations using complex systems for various purposes can easily identify shared activity within the environment. There is a detection base that allows us to identify and manage threat events. The solution also includes licenses for forensic investigations of any attack that occurs. Details can be found within the platform's release at the end of the month or whenever needed. Any Trellix malware activity will be displayed on the dashboard, and the moderating services will be integrated into everything we have built.

    What is most valuable?

    The dashboard makes it easier and more effective to analyze data. It also allows us to access the AWS analytics and system features in one place. If we need to find specific details about an endpoint, we can determine what is happening and how any organization is affected by the data provided.

    What needs improvement?

    The better approach is to apply the necessary improvements to make the dashboard more effective and user-friendly. If simplified, users can investigate issues in more detail by clicking on the relevant sections. Making it simpler would enhance understanding and improve the investigation process. Customers currently using the system can view everything on a single dashboard, which is very effective for understanding all scenarios and activities.

    Customers rely on a single platform When they notice an incident, response, or attack. In SOC analysis teams, especially in banks or traditional organizations, the entire team needs access to the scenario on one platform. This allows them to understand the dashboard and detect any ongoing activity easily. Once they identify an issue, they can proceed with further analysis. Customers need a clear and visible platform that helps them understand when and how their site is being compromised.

    The dashboard is split across different platforms. For example, if you want information on Incident Detection, you have to access one dashboard, and for DLP reporting, there's a separate platform. This fragmentation means you can't access everything from a single dashboard. Instead, you must navigate various options to find the right dashboard. This setup results in a separate view for each function. Ideally, we'd like to consolidate this into a unified platform, making it easier to identify site behaviors from one centralized dashboard.

    For how long have I used the solution?

    I have been using Trellix Endpoint Detection and Response (EDR) as a reseller.

    What do I think about the stability of the solution?

    We initially used McAfee's VSP and Varia System Enterprise products. After transitioning to Endpoint Security, particularly in version 10 or 7, we encountered performance issues on systems running Windows 7. The high resource utilization caused significant slowdowns, leading to numerous complaints, especially from Sakasho. The EDR was consuming too many system resources, which impacted overall performance. However, with the newer versions, like those in the InVision EPO, these issues seem to have been resolved, and the system now operates more efficiently. The current product is expected to be much lighter and more stable.

    I rate the solution’s stability an eight out of ten.

    What do I think about the scalability of the solution?

    I highly appreciate service architecture. They are developing day by day.

    We are an enterprise that provides solutions through Trellix EDR that various external customers use. Our solutions are deployed in a large and diverse environment, including companies, telecoms, and major banks. These organizations rely on our products for their protection needs.

    How are customer service and support?

    There are multiple ways to get support. You can create a case through your partner or support portal by calling. If necessary, you can raise a call and follow up immediately.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    We operate within our environment and country. One of our clients, is interested in using our on-premises solution. They are hesitant to adopt a cloud-based solution due to concerns about data security. They worry that storing data in the cloud could expose it to unauthorized access. They are confused about how the cloud handles sensitive data like CPU data and prefer to keep their information on-premises. However, other banks have embraced cloud solutions and understand their value. Over time, as more companies study and become comfortable with cloud technology, we believe others will also follow and move to the cloud. We hope to maintain their interest in our services.

    What other advice do I have?

    Its machine learning capability is strong, and the AI configurations and system integration enhance its effectiveness. The API solutions added to this system allow us to detect and respond to incidents quickly. The quick response is also due to Edge Solutions and specific-type solutions, enabling us to conduct thorough investigations and generate reports on the platform.

    I recommend Trellix Endpoint Detection and Response (EDR) because it offers strong capabilities. It’s worth noting that XDR solutions are also available and might be more effective. These XDR solutions are advanced technologies with enhanced features, including improved API integration.

    Overall, I rate the solution an eight out of ten.

    View all reviews